| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNISA996418294503316 |
|
|
Titolo |
Applied cryptography and network security workshops : ACNS 2020 Satellite Workshops, AIBlock, AIHWS, AIoTS, Cloud S&P, SCI, SecMT, and SiMLA, Rome, Italy, October 19-22, 2020, proceedings / / Jianying Zhou [and nine others] editors |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Cham, Switzerland : , : Springer, , [2020] |
|
©2020 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[1st ed. 2020.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (XVII, 584 p. 178 illus., 115 illus. in color.) |
|
|
|
|
|
|
Collana |
|
Security and Cryptology ; ; 12418 |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Data encryption (Computer science) |
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Nota di contenuto |
|
AIBlock: Application Intelligence and Blockchain Security -- AIHWS: Artificial Intelligence in Hardware Security -- AIoTS: Artificial Intelligence and Industrial Internet-of-Things Security -- Cloud S&P: Cloud Security and Privacy -- SCI: Secure Cryptographic Implementation -- SecMT: Security in Mobile Technologies -- SiMLA: Security in Machine Learning and its Applications. |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
This book constitutes the proceedings of the satellite workshops held around the 18th International Conference on Applied Cryptography and Network Security, ACNS 2020, in Rome, Italy, in October 2020. The 31 papers presented in this volume were carefully reviewed and selected from 65 submissions. They stem from the following workshops: AIBlock 2020: Second International Workshop on Application Intelligence and Blockchain Security AIHWS 2020: First International Workshop on Artificial Intelligence in Hardware Security AIoTS 2020: Second International Workshop on Artificial Intelligence and Industrial Internet-of-Things Security Cloud S&P 2020: Second International Workshop on Cloud Security and Privacy SCI 2020: First International Workshop on Secure Cryptographic Implementation SecMT 2020: First International Workshop on Security in Mobile Technologies SiMLA 2020: Second International Workshop on Security in Machine Learning and its Applications. |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
2. |
Record Nr. |
UNINA9910133729303321 |
|
|
Autore |
Rettberg Jill Walker |
|
|
Titolo |
Seeing ourselves through technology : how we use selfies, blogs and wearable devices to see and shape ourselves / / by Jill Walker Rettberg |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
London, England : , : Palgrave Macmillan UK : , : Imprint : Palgrave Macmillan, , [2014] |
|
©2014 |
|
|
|
|
|
|
|
|
|
ISBN |
|
1-137-47664-8 |
1-349-55172-4 |
|
|
|
|
|
|
|
|
Descrizione fisica |
|
1 online resource (viii, 101 pages) |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Culture - Study and teaching |
Social media |
Self-perception - 21st century |
Self-presentation - 21st century |
Communication |
Industries |
Children's literature |
Social sciences |
Personality |
Social psychology |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
Sommario/riassunto |
|
This book is open access under a CC BY license. Selfies, blogs and lifelogging devices help us understand ourselves, building on long histories of written, visual and quantitative modes of self-representations. This book uses examples to explore the balance between using technology to see ourselves and allowing our machines to tell us who we are. |
|
|
|
|
|
|
|
| |